About
Cyber security Analyst with over 3+ years of experience in 24/7 Security Operations Center (SOC) environments. Proficient in using SIEM tools such as Azure Sentinel, IBM QRadar, and Splunk to monitor, detect, and respond to security events. Expertise in incident handling, threat detection, network traffic monitoring, and log analysis. Strong background in identifying and classifying attempted network compromises through heuristics analysis and suspect traffic identification. Skilled in providing real-time security event response, ensuring system integrity, and mitigating security risks.
Skills & Expertise (13)
Work Experience
Security Analyst
Infosys Private Limited
Jun 2022 - Feb 2026
Monitoring and analysis of events generated by various security and network tools like Firewalls, Proxy servers, AV, IPS/IDS, System Application, Windows and Linux servers etc. Responsible for monitoring security alerts, analysis of logs, investigation, and assessment on whether the incident is False positive or True positive. Using SIEM tool Azure sentinel to detect possible signs of security breaches and perform detailed investigation to confirm successful breach. Perform root cause analysis (RCA) and appropriately handle the incident as per defined Incident Management Framework. Following end to end Incident Investigation and Incident Response process, ensuring close the investigation within defined SLA. Leveraging KQL (Kusto Query Language) to identify anomalous behavior, and work with threat intelligence to investigate and respond to emerging threats. Creating tickets in Service now and tracking the status of the incidents. Analyse Microsoft Defender for Office 365 for suspicious activity, phishing attempts, and unauthorized access. Investigating phishing alerts generated by Microsoft defender for office 365 such as potential URL clicks, suspicious email attachments opened and removed after delivery. Knowledge sharing sessions with the team members whenever complex incident issues are raised and also lessons learned from other team members. Analyse device timeline in Microsoft Defender for Endpoint to identify suspicious processes, logins, and network activity. Perform remediation by quarantining or deleting malicious files and blocking indicators.
Education
B.Tech - ACE Engineering College
2019 - 2021 · Afghanistan